Homeland Security
Agency Resources Address Violations of Restricted Airspace, but Management Improvements Are Needed
Gao ID: GAO-05-928T July 21, 2005
Securing and defending U.S. airspace is an interagency mission that depends on close interagency coordination and information sharing. GAO was asked to review (1) the threat assessment for U.S. aviation, (2) violations of restricted airspace since September 11, 2001, (3) agencies' individual or coordinated steps to secure U.S. aviation, and (4) interagency policies and procedures to manage the response to restricted airspace violations. GAO will issue a classified report responding to this request later this year. To keep this testimony unclassified, GAO focused on the latter three questions.
The Federal Aviation Administration reported about 3,400 violations of restricted airspace from September 12, 2001, to December 31, 2004, most of which were committed by general aviation pilots. Violations can occur because (1) pilots may divert from their flight plan to avoid bad weather, (2) the Administration may establish newly restricted airspace with little warning, and pilots in the air may be unaware of the new restrictions, or (3) pilots do not check for notices of restrictions, as required. Also, terrorists may deliberately enter restricted airspace to test the government's response or carry out an attack. Federal agencies have acted individually or have coordinated to enhance aviation security. For example, the Transportation Security Administration (TSA) established a national operations center that disseminates operational- and intelligence-related information, and has enhanced passenger and checked baggage screening, secured cockpit doors, and assessed the risk to some, but not all, commercial airports. Also, few general aviation airport owners have conducted risk assessments. The North American Aerospace Defense Command's mission was expanded to include monitoring domestic air traffic and conducting air patrols. Collectively, the agencies are operating the National Capital Region Coordination Center to secure the National Capital Region. GAO identified gaps in the simultaneous, time-critical, multi-agency response to airspace violations. While it may not be possible to prevent all violations or deter all attacks, GAO identified some gaps in policies and procedures. Specifically, the agencies were operating without (1) an organization in the lead, (2) fully developed interagency policies and procedures for the airspace violations response teleconferencing system, (3) information sharing protocols and procedures, or (4) accepted definitions of a violation. As a result, opportunities may be missed to enhance the security of U.S. aviation.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-05-928T, Homeland Security: Agency Resources Address Violations of Restricted Airspace, but Management Improvements Are Needed
This is the accessible text file for GAO report number GAO-05-928T
entitled 'Homeland Security: Agency Resources Address Violations of
Restricted Airspace, but Management Improvements Are Needed' which was
released on July 21, 2005.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Testimony:
Before the Committee on Government Reform, House of Representatives:
United States Government Accountability Office:
GAO:
For Release on Delivery Expected at 10:00 a.m. EDT:
Thursday, July 21, 2005:
Homeland Security:
Agency Resources Address Violations of Restricted Airspace, but
Management Improvements Are Needed:
Statement of Davi M. D'Agostino, Director:
Defense Capabilities and Management:
GAO-05-928T:
GAO Highlights:
Highlights of GAO-05-928T, a testimony before the Committee on
Government Reform and Oversight, House of Representatives:
Why GAO Did This Study:
Securing and defending U.S. airspace is an interagency mission that
depends on close interagency coordination and information sharing. GAO
was asked to review (1) the threat assessment for U.S. aviation, (2)
violations of restricted airspace since September 11, 2001, (3)
agencies‘ individual or coordinated steps to secure U.S. aviation, and
(4) interagency policies and procedures to manage the response to
restricted airspace violations. GAO will issue a classified report
responding to this request later this year. To keep this testimony
unclassified, GAO focused on the latter three questions.
What GAO Found:
The Federal Aviation Administration reported about 3,400 violations of
restricted airspace from September 12, 2001, to December 31, 2004, most
of which were committed by general aviation pilots. Violations can
occur because (1) pilots may divert from their flight plan to avoid bad
weather, (2) the Administration may establish newly restricted airspace
with little warning, and pilots in the air may be unaware of the new
restrictions, or (3) pilots do not check for notices of restrictions,
as required. Also, terrorists may deliberately enter restricted
airspace to test the government‘s response or carry out an attack.
Federal agencies have acted individually or have coordinated to enhance
aviation security. For example, the Transportation Security
Administration (TSA) established a national operations center that
disseminates operational- and intelligence-related information, and has
enhanced passenger and checked baggage screening, secured cockpit
doors, and assessed the risk to some, but not all, commercial airports.
Also, few general aviation airport owners have conducted risk
assessments. The North American Aerospace Defense Command‘s mission was
expanded to include monitoring domestic air traffic and conducting air
patrols. Collectively, the agencies are operating the National Capital
Region Coordination Center to secure the National Capital Region.
GAO identified gaps in the simultaneous, time-critical, multi-agency
response to airspace violations. While it may not be possible to
prevent all violations or deter all attacks, GAO identified some gaps
in policies and procedures. Specifically, the agencies were operating
without (1) an organization in the lead, (2) fully developed
interagency policies and procedures for the airspace violations
response teleconferencing system, (3) information sharing protocols and
procedures, or (4) accepted definitions of a violation. As a result,
opportunities may be missed to enhance the security of U.S. aviation.
Depiction of a Potential Restricted Airspace Violation:
[See PDF for image]
Source: GAO.
[End of figure]
What GAO Recommends:
GAO recommended that the Secretaries of Defense, Transportation, and
Homeland Security strengthen the interagency process for managing the
response to violations of restricted airspace by determining whether an
organization should be in charge, developing interagency policies and
procedures, information sharing protocols, and common definitions. DHS
and DOD disagreed that one agency should be in charge, largely from
command and control concerns. DHS concurred or partially concurred with
the other recommendations; DOD nonconcurred with most of the rest. The
Department of Transportation concurred with GAO‘s recommendations.
www.gao.gov/cgi-bin/getrpt?GAO-05-928T.
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Davi M. D'Agostino, (202)
512-5431, dagostinod@gao.gov.
[End of section]
Chairman Davis and Members of the Committee:
I appreciate the opportunity to be here today to provide results of
GAO's work on violations of restricted airspace and the interagency
response. Specifically, I will discuss the unclassified results from
our classified report on violations into restricted airspace that we
will issue in September 2005.
As you know, because of intelligence assessments since the September
11, 2001, attacks, the United States has established additional
temporary flight restrictions over important sites such as selected
governmental operations, national events, and critical
infrastructure.[Footnote 1] Established by the Federal Aviation
Administration (FAA), temporary flight restrictions and other special
use airspace measures are national airspace management tools used to
restrict flights into protected airspace. The intent of establishing
restricted airspace is to reduce the number of flights in that airspace
to only those authorized so that the FAA, the Department of Defense
(DOD), the Department of Homeland Security's (DHS) Transportation
Security Administration (TSA), and other agencies can more readily
identify an unauthorized aircraft and, if needed, take actions to deter
or defeat it.
Intelligence agencies believe that terrorists remain highly interested
in attacking U.S. aviation with commercial or general aviation
aircraft, in attacking an airport, or in using aircraft to attack
targets. Intelligence agencies differ in their assessments of how
significant the threat is from the use of certain general aviation
aircraft in an attack. Our prior work has shown that the success of
interagency efforts depends on melding multi-organizational efforts
through central leadership, an overarching strategy, effective
partnerships, and common definitions.[Footnote 2] Securing and
defending U.S. airspace is a key example of an interagency mission that
depends on close coordination and information sharing between and among
the agencies that share this mission. As many as 7 key government
organizations can be simultaneously involved in responding to a
violation of restricted airspace. TSA is responsible for ensuring that
only authorized pilots, cabin crewmembers, or passengers gain access to
an aircraft. Once airborne, FAA becomes the lead agency and is
responsible for managing traffic entering into or operating in U.S.
airspace to ensure safe operations by monitoring aircraft movements
using radar and maintaining communications with the pilots. Either
DOD's North American Aerospace Defense Command (NORAD) or DHS is called
in to enforce airspace security if TSA or FAA cannot prevent someone
from taking control of an aircraft without authorization or flying into
restricted airspace without authorization. During a violation, these
agencies carry out their responsibilities simultaneously. This was the
case during the incursions into the National Capital Region restricted
airspace during May 2005.
Today I will provide our findings on (1) violations of restricted
airspace since September 11, 2001, (2) agencies' individual or
coordinated steps to secure U.S. aviation, and (3) interagency policies
and procedures to manage the response to violations of restricted
airspace. I will also summarize our recommendations and the agency
comments.
Summary:
The FAA reported about 3,400 violations of restricted airspace
nationwide from September 12, 2001, to December 31, 2004, most of which
were committed by general aviation pilots. Violations can occur because
(1) pilots may need to divert from their planned flight path to avoid
bad weather and may consequently enter restricted airspace; (2) the FAA
may establish the restricted airspace with little warning, and pilots
already in the air may be unaware of the new restrictions; and (3)
pilots may not check FAA notifications of new restrictions, as
required.[Footnote 3] Also, terrorists might deliberately enter
restricted airspace to observe the government's response or to carry
out an attack. Most violations of restricted airspace occur in the
eastern United States due to heavy air traffic in the area and the
large amount of restricted airspace. Moreover, most violations of
restricted airspace in the eastern United States occur in the National
Capital Region. General aviation accounts for about 88 percent of all
violations nationwide. We did not review the actions taken by FAA
against pilots who violate restricted airspace, although we do describe
the actions FAA can take.
Since September 11, 2001, federal agencies have acted individually or
have coordinated to secure U.S. airspace and address the threat:
* TSA secured commercial aircraft, limited potential access to
commercial aviation aircraft and facilities, and conducted risk
assessments of some facilities.
* FAA has increased its use of temporarily restricted airspace for
national security purposes and has issued over 220 Notices to
Airmen[Footnote 4] to identify the location of restricted airspace. In
addition, the FAA established the Domestic Events Network,[Footnote 5]
an interagency teleconferencing system that permits the agencies to
communicate about and coordinate their response to violations of
restricted airspace.
* NORAD increased air patrols and improved airspace monitoring.
* Collectively, the agencies were operating the National Capital Region
Coordination Center to bring key agencies together to secure the
airspace over the National Capital Region.
We identified gaps in the management of the interagency response to
airspace violations. Individual agency and interagency progress and
coordination to secure airspace is noteworthy. However, we recognize
that it may not be possible to prevent all violations of restricted
airspace or deter all attacks. Airspace security measures could be
challenged. Moreover, in some cases pilots do not check on airspace
restrictions, as they are required to do. Such challenges, along with
the complexity of several agencies simultaneously carrying out their
respective agency responsibilities, highlight the need for clear
policies and procedures and optimal interagency coordination for the
most timely and effective management of the nation's airspace security
and violations of restricted airspace. Nevertheless, potential gaps
remain:
* TSA officials told us that the agency has conducted risk
assessments[Footnote 6] at some but not all of the commercial airports
in the United States.[Footnote 7]
* While each agency commands and controls its own resources, no one
organization leads the interagency response to airspace violations.
TSA, FAA, and DOD officials told us that at the National Capital Region
Coordination Center no one organization is in the lead because,
depending on the nature of the airspace violation, each of the agencies
simultaneously carries out its responsibilities during the phases of
the violation. TSA is the executive agent for the Center, but TSA
officials said that they only resolve or "deconflict" agency issues and
do not see themselves as being in charge.
* The agencies have not developed policies and procedures over who has
access to the Domestic Events Network, and FAA personnel told us that
under certain circumstances, they could be cut out of conferences if
these conferences go above a certain security classification and
different communication systems are used.
* As threat conditions warrant, the agencies may take additional steps
to secure the airspace outside the National Capital Region but they
have not begun to develop an overarching plan for such
airspace.[Footnote 8] As a result, interagency coordination may be
hampered.
* Agency database records documenting violations were not routinely
shared among FAA, NORAD, or TSA, or with FAA's Strategic Operations
Security Manager, because the agencies have not established information
sharing requirements and protocols. We reviewed FAA data and identified
information we believe agencies could use to better secure U.S.
airspace. Because data are not routinely shared, these agencies may
miss opportunities to enhance security.
* The potential for confusion about what constitutes an airspace
violation exists among the agencies because they do not have a common
definition of an airspace violation. As a result, the agencies may be
unaware of the scope and magnitude of the problem, making it more
difficult to allocate resources efficiently.
We made several recommendations to DHS, DOD, and the Department of
Transportation to strengthen the interagency process for managing the
response to violations of restricted airspace. DHS and DOD nonconcurred
with our recommendation that the three secretaries should determine
whether one agency should manage the interagency process of responding
to violations of restricted airspace, primarily because of concerns
about command and control. DHS and Transportation concurred or
partially concurred with most or all of our recommendations. DOD
nonconcurred with most of our recommendations.
Background:
After the terrorist attacks on the United States on September 11, 2001,
federal agencies took immediate steps to secure U.S. airspace. FAA
grounded all air traffic and DOD ordered Air Force fighter jets to fly
patrols over selected U.S. cites to deter and respond to any additional
attacks. In the months after the attacks, the President developed
certain national strategies and directives, and Congress established
TSA and gave it the responsibility to provide security for all modes of
transportation. Congress also later passed and the President signed
legislation to protect the homeland against air, land, and maritime
threats, including creating the DHS to coordinate and lead the national
homeland security effort. After the attacks, interagency coordination
increased as FAA, NORAD, TSA, their parent cabinet departments, and
other agencies with homeland air defense or security roles and missions
worked together to meet the overall goal of protecting U.S. airspace.
NORAD and the FAA have historically been the main contributors to
protecting U.S. airspace. FAA's primary mission is to safely manage the
flow of air traffic in the United States, but it contributes to air
security through its control of U.S. airspace. About 17,000 FAA
controllers monitor and manage airspace, support the coordination of
security operations, and provide information to military and law
enforcement agencies when needed. Within NORAD, Continental North
American Aerospace Defense Command Region personnel monitor radar data
on aircraft entering and operating within continental U.S. airspace.
NORAD also conducts air patrols in U.S. airspace.
Different Classes and Use of Airspace:
According to FAA, the agency divides airspace into four categories:
controlled, uncontrolled, special use, and other.[Footnote 9]
Controlled airspace may include special flight restrictions and will
have specific defined dimensions, including altitude ranges, or
vertical boundaries, and surface area, or horizontal boundaries. Any
aircraft operating within controlled airspace must comply with rules
governing that airspace or be subject to enforcement action. Controlled
airspace is further divided into classes ranging from A through E. Each
class of airspace has its own level of Air Traffic Control services and
operational requirements that pilots must follow in order to enter and
operate in it. For example, to operate in class A airspace, pilots must
have air traffic controller clearance to enter and must have
communication equipment on board to permit communication with air
traffic controllers. In lesser-restricted airspace, pilots can navigate
by landmarks. Controlled airspace can be further classified with
special flight restrictions. In uncontrolled airspace, class G, air
traffic controllers have no authority or responsibility to control air
traffic.
FAA also reserves airspace for special purposes, called Special Use
Airspace, which is normally established to protect important
infrastructure, including military installations. An Air Defense
Identification Zone[Footnote 10] is restricted airspace in which the
ready notification, location, and control of aircraft are required for
national security reasons.
FAA's other airspace category includes national security areas,
military training routes, and temporary flight restriction areas. A
temporary flight restriction typically restricts flights over specified
areas for a specified period of time. These zones can be established
over critical infrastructure, military operations areas, National
Security Special Events, and United States Secret Service protectees
(e.g. such as the President, whose airspace is protected as he moves
throughout the United States).
FAA notifies pilots of temporary flight restrictions through its
Notices to Airmen program. Pilots are required to check for notices
before beginning their flights to avoid any temporary flight
restriction zones during their flights. If pilots violate such a zone,
FAA can take actions against them ranging from suspending the pilot's
certificate to fly in response to a one-time, first-time violation to
revocation of the certificate when the violation is deliberate or
otherwise shows a disregard for the regulations.
Temporary flight restrictions are one component of a tiered security
aviation system. The system includes ground procedures, such as TSA
passenger screening procedures, and in-flight security procedures,
including reinforced cockpit doors and Federal Air Marshals on selected
domestic and international flights. Temporary flight restrictions are
considered passive air space control measures intended to keep the
flying public out of the protected airspace so that agencies can more
readily identify and respond to pilots exhibiting hostile intent. A
temporary flight restriction alone will not prevent pilots from
entering the protected airspace.
FAA monitors national airspace traffic to ensure safety and has
established triggers to help identify suspicious aircraft and pilots.
According to FAA procedures, FAA controllers are to advise the pilots
to change their course or altitude if they are on a course toward
prohibited or restricted airspace without authorization, or if they are
circling or loitering over a sensitive area. Sensitive areas include
airspace over dams, nuclear and electrical power plants, chemical
storage sites, the location of the President, or military facilities.
Various forms of suspicious pilot and aircraft activity are being
monitored.
If a violation is imminent or underway, responding agencies have only
limited time in which to decide what actions to take. Nonetheless, the
agencies need sufficient time to try to determine the pilot's intent
and, if necessary, to order, scramble, and launch DOD or DHS aircraft
to intercept the violator.
The response to a violation is managed using a process of recognition,
assessment and warning, interdiction, recovery, and follow-up; which
agency takes these actions depends on the specific nature of the
violation. FAA can report a violation of restricted airspace based on
radar tracking. If the offending aircraft deviates from its planned
flight path but is not heading directly toward the protected asset, FAA
may monitor the aircraft and try to contact the pilot but not interdict
the aircraft. Conversely, if NORAD or FAA perceives the aircraft to be
a threat based on its speed, direction, or other information, NORAD can
alert its aircraft and attempt to intercept the violator. If
successfully diverted away from the protected asset or restricted
airspace, Secret Service, FAA, TSA, or local law enforcement officers
may meet the aircraft and interview the pilot upon landing, to identify
any hostile intent. On the other hand, if the offending pilot does not
divert and proceeds to operate in a manner perceived as threatening,
the NORAD pilot can be ordered by the appropriate authorities to engage
the violating aircraft. Figure 1 shows an aircraft deviating from its
planned flight path and shows more highly threatening and, conversely,
less threatening violations of restricted airspace.
Figure 1: A Potential Restricted Airspace Violation:
[See PDF for image]
[End of figure]
Violations of Restricted Airspace:
Our review of an FAA database found about 3,400 reported violations of
restricted airspace from September 12, 2001, to December 31, 2004, most
of which were committed by general aviation pilots. According to FAA,
violations occur because (1) pilots may divert from their planned
flight path to avoid bad weather, or may make navigational errors and
consequently enter restricted airspace; (2) FAA may establish airspace
restrictions with little warning, and pilots already in the air may be
unaware of the new restrictions; or (3) pilots may not check for
notices of new restrictions as required by FAA and may consequently
enter restricted airspace without authorization. In addition,
terrorists might deliberately enter restricted airspace to observe the
government's response or to carry out an attack. FAA investigates pilot
deviations into restricted airspace to determine the reasons for an
incident and to determine whether the pilot's certificate should be
temporarily suspended or permanently revoked.
Factors That Contributed to Incursions:
As the scope of restricted airspace increases, the number of violations
generally also increases. In addition, a greater concentration of air
traffic, such as in the eastern United States, would affect the number
of violations. FAA has worked with the aviation community to inform
them of the additional restricted areas. Figure 2 shows the percentage
of violations of restricted airspace by area of the United States.
Figure 2: U.S Map With Percentages of Violations by FAA Area September
12, 2001 through December 31, 2004:
[See PDF for image]
[End of figure]
General aviation aircraft pilots accounted for about 88 percent of all
violations of restricted U.S. airspace between September 12, 2001, and
December 31, 2004. Figure 3 shows the percentage of incursions by type
of aircraft.
Figure 3: Violations by Type of Aircraft:
[See PDF for image]
Note: Data rounded to the nearest percent. FAA records a violation as
unknown when it is unable to identify the offending aircraft. Unknown
aircraft may include aircraft that depart from the restricted airspace
before authorities can identify them.
[End of figure]
According to FAA data, pilot error is the biggest contributor to
restricted airspace violations. Pilots may not check for FAA Notices to
Airmen that indicate the location of restricted airspace, or FAA may
establish such airspace with little warning, and pilots may
consequently enter the airspace. Airspace restrictions can move, such
as when the President travels. Notices on the location of newly
restricted airspace may be issued quickly, and pilots may already be in
their aircraft or in the air when the restriction is announced and
implemented. Moreover, pilots may fly around bad weather or may
experience equipment problems and consequently enter restricted
airspace to maintain safe operations.
To reduce violations, FAA has conducted safety seminars, provided a
toll-free number for pilots to call and check for restricted airspace,
identified the location of restricted airspace on its Web site, and
encouraged pilots to check for and be attentive to notices on
restricted airspace.[Footnote 11]
FAA Actions to Temporarily Suspend or Permanently Revoke Pilot
Certificates:
When a pilot enters restricted airspace without authorization, FAA
investigates and decides what actions to take against the pilot. After
the September 2001 attacks, FAA strengthened the actions that it could
take. For example, FAA no longer issues warning notices or letters of
correction to pilots. Instead, FAA will now suspend a pilot's
certificate for 30 to 90 days for a single, inadvertent, first-time
violation of a temporary flight restriction area that was established
with a notice. The temporary suspension's length depends on the degree
of danger to other aircraft and persons or property on the ground, the
pilot's level of experience, prior violations record, and certain other
factors. If a pilot deliberately enters restricted airspace without
authorization, FAA will revoke the pilot's certificate.
Federal Agencies Have Taken Individual and Coordinated Actions to
Mitigate the Terrorist Threat to U.S. Aviation:
Federal agencies have undertaken individual and coordinated initiatives
to secure U.S. aviation by trying to ensure that only authorized
personnel gain access to aircraft or airports, expanding efforts to
educate pilots about the location of restricted airspace and the
circumstances under which they may enter such airspace, improving the
monitoring of domestic airspace, enhancing their ability to enforce
airspace restrictions, and trying to effectively coordinate a response
to each restricted airspace violation in the event that prevention
fails. TSA, FAA, and DOD have individually and in a coordinated way
directed resources to mitigate the risk of terrorists using commercial
aircraft as weapons or targets.[Footnote 12] Some of the most publicly
visible changes are the advent of TSA operations at over 400 airports,
which include more rigorous passenger screening procedures.
TSA Has Acted to Secure Aviation:
The Aviation and Transportation Security Act, enacted November 2001,
authorized TSA to secure all modes of transportation.[Footnote 13]
Since then, TSA has established the Transportation Security Operations
Center, a national center that operates around the clock and analyzes
and disseminates operational-and intelligence-related information for
all modes of transportation. TSA has also enhanced passenger and
checked baggage screening, expanded the Federal Air Marshal Service to
place more marshals on international and domestic commercial flights,
and secured cockpit doors to prevent unauthorized entry to the flight
decks of commercial airliners.[Footnote 14] In addition, the Federal
Flight Deck Officers program is training pilots on commercial passenger
and cargo aircraft in how to use lethal force against an intruder on
the flight deck. In addition, TSA has expanded background checks for
more of the aviation workforce.
TSA is also working to fully implement a risk management approach that
would include risk assessment tools for targeting resources to improve
security. For example, the tool might indicate the level of
preparedness of a facility, given probable threat scenarios. The tool
may show that, based on a particular threat scenario, a facility's
physical security may be vulnerable, or access controls to the facility
may be weak. Based on the findings from use of the tool, owners and
operators could take actions to reduce these risks.
FAA Has Taken Steps to Monitor Airspace and Support a Coordinated
Interagency Response to Violations:
After September 11, 2001, FAA established additional temporary flight
restrictions over sensitive sites in the United States and established
a teleconferencing system to coordinate the nation's response to
violations of restricted airspace. Many of the additional temporary
flight restrictions were established over selected critical
infrastructures. Prior to the attacks, temporary flight restrictions
were rarely used for national security purposes. Since the attacks, FAA
has issued over 220 Notices to Airmen identifying temporary flight
restrictions. In addition, the amount of airspace associated with some
temporary flight restrictions has increased both vertically and
laterally. For example, presidential temporary flight restrictions
around the President have increased laterally from 3 to 30 nautical
miles and vertically from 3,000 feet to 18,000 feet.
To alert DOD, TSA, the Federal Bureau of Investigation, and other
agencies of suspicious activities or potential violations of protected
airspace, FAA established the Domestic Events Network after the
September 11, 2001, attacks. As discussed earlier, FAA also increased
the sanctions against pilots who enter restricted airspace without
authorization, and it has continued to educate pilots about restricted
airspace.
NORAD's Mission Has Expanded to Defend Domestic U.S. Airspace:
After the September 2001 attacks, NORAD's mission was expanded beyond
defending just external airspace to include domestic airspace. NORAD
also committed more fighters, refueling, and early warning aircraft to
support its expanded mission. These aircraft are part of DOD's
Operation Noble Eagle[Footnote 15] and conduct air patrols over
Washington, D.C., New York City, Chicago, Los Angeles, and other cities
based on the threat level and threat intelligence received and
analyzed. NORAD continually evaluates such information and directs
operations such as that of ordering fighters to patrol airspace over
these and other cities as appropriate. NORAD can also expand its
overall national air defense response levels and commit additional
resources according to the threat level.
To facilitate its current domestic military mission, NORAD expanded its
ability to monitor domestic airspace. Prior to the September 2001
attacks, NORAD did not monitor domestic airspace. However, following
the attacks and the expansion of NORAD's mission to include domestic
air defense, the command gained access to FAA's domestic airspace radar
system, with a software upgrade. During our review, NORAD was testing
replacement software that would allow it to achieve efficiencies in
securing domestic airspace. However, air defense-sector radar
operations crews we interviewed expressed concerns about the new
software. We briefed NORAD officials on these concerns, and the
officials responded that they would not accept the software until air
defense personnel were satisfied with its performance. Moreover, in
addition to normal software development meetings that NORAD had
conducted with the users, NORAD also held special meetings to address
the air defense-sector personnel's concerns. System testing was
scheduled through 2005.
NORAD is also trying to improve the data that it collects and records
on violations of restricted airspace. Our review found discrepancies in
the numbers of violations of restricted airspace recorded between the
air defense sectors and NORAD headquarters. For example, from January
through November 2004, the Northeast Air Defense Sector reported 2,069
cases where aircraft were monitored for violations of restricted
airspace and other activities.[Footnote 16] However, NORAD headquarters
had information on only 266, or 13 percent of the cases. NORAD
headquarters acted to correct the problem and is implementing a new
reporting system and conducting training. NORAD's air defense sectors
are primarily responsible for tracking and cataloging restricted
airspace violations. NORAD headquarters officials told us that their
airspace data had not been shared outside DOD. However, in July 2005,
DOD informed us that it is planning to share information contained in
its new system with the FAA upon completion of an interagency
memorandum of understanding.
Coordinated Agency Initiatives Taken to Secure U.S. Aviation:
The agencies have recognized that individual actions alone are not
sufficient to respond to violations of restricted airspace, and
consequently they have also coordinated their efforts to try and
enhance the response to each violation. The agencies have established
the National Capital Region Coordination Center to enhance the
effectiveness of air security and air defense operations in the
national capital region. The center's primary mission is to facilitate
rapid coordination and information sharing among participating agencies
in preventing, deterring, and interdicting air threats to the region.
To facilitate center operations, the participating agencies approved a
concept of operations plan in May 2005 that identifies agency roles and
missions in securing and defending national capital region airspace and
specifies certain interagency operating protocols.
Interagency Management of the Response to Airspace Violations Could
Benefit from Closing Gaps in Policies and Procedures:
The individual and coordinated agencies' actions represent noteworthy
efforts to counter the threat to U.S. aviation and the homeland.
However, it is important to recognize that it may not be possible to
prevent all restricted airspace violations or to deter all attacks.
Airspace security measures could be challenged. In addition, in some
cases, some pilots do not consult FAA notices on the location of
restricted airspace as required by FAA, and consequently sometimes
inadvertently enter restricted airspace without authorization. Although
FAA has established stricter sanctions against pilots and stepped up
its outreach efforts, violations continued at the time of our review.
Consequently, the interagency management of the response to airspace
violations could benefit from filling gaps in policies and procedures.
We also identified gaps in TSA's risk assessment of the aviation
sector.
Gaps in TSA Risk Assessments:
TSA has made improvements in airspace security; however, TSA does not
have complete knowledge of the level of risk existing in the commercial
aviation sector. While agency officials told us that they conducted
vulnerability assessments, a component of risk assessments, at many of
the commercial airports, they had not assessed all of them. TSA
officials explained that they had not yet established milestones for
specific actions needed to complete the risk assessments. As a result,
TSA lacks assurance that some airport managers have taken reasonable
steps to enhance security.
General aviation airports and aircraft are also a concern because TSA
has generally not assessed the level of security existing at these
airports. About 19,000 general aviation airports operate in the United
States, and TSA's overall vulnerability assessments at these airports
have been limited. Most general aviation airports are not required to
provide the same level of screening for pre-boarding passengers as at
commercial airports. TSA has reviewed some general aviation airports
for vulnerabilities and developed risk assessment tools to enable
managers to conduct self-assessments. Nonetheless, the assessments are
voluntary, and the completion of these assessments has been
limited.[Footnote 17] Thus, TSA plans to outreach to airport managers
to promote use of the tool. In a November 2004 report, we recommended
that the Secretary of Homeland Security direct the Assistant Secretary
of TSA to develop an implementation plan with milestones and time
frames to execute a risk management approach for general aviation, and
the agency concurred with our recommendation.
Gaps in the Interagency Management of Violations:
While improvements have been made in the overall management response to
airspace violations, the interagency response to airspace violations
suggests that there are opportunities for further improvement, because
these agencies have not formally developed an interagency program to
institutionalize the defense of restricted airspace. Specifically, the
agencies do not have:
* an organization in charge,
* interagency policies and procedures,
* protocols for information sharing, and:
* common definitions of restricted airspace violations.
Leadership Over the National Capital Region Coordination Center Is
Uncertain:
Each agency simultaneously acts and commands and controls its own
resources in responding to a violation of restricted airspace. At the
same time, TSA, FAA, and DOD officials told us that, at the National
Capital Region Coordination Center, determining who leads the
interagency response is difficult, may change depending on the nature
of the airspace violation, and may shift during the course of a
violation, as the agencies monitor the intruder's flight and consider
the appropriate response. TSA is the executive agency for the center,
but TSA officials said that they only resolve or "deconflict" agency
issues and do not see themselves as being in charge of the interagency
process for responding to violations of restricted airspace. At the
same time, DOD pointed out that the response at the center has little
or no effect on NORAD's response, because NORAD and FAA control
National Capital Region airspace. Without central leadership, the
potential exists for a somewhat slower response to a violation as the
agencies decide who is in charge while the violating aircraft continues
to operate in restricted airspace.
Interagency Coordination Is Occurring, but Policies and Procedures Are
Not Well Established:
While the interagency coordination achieved at the time our report was
noteworthy, TSA, FAA, DOD, and other agencies had not implemented
certain key policies and procedures that are critical to multi-
organizational success, particularly when they are acting
simultaneously in a time-critical operation. For example, the agencies
had not agreed on policies and procedures to specify who has access to
Domestic Events Network-initiated conferences, and under what
circumstances. Additionally, according to FAA, during a violation FAA
personnel may not have access to DOD's classified teleconference
systems if the interagency response goes beyond a certain national
security classification, because FAA officials may lack appropriate
security clearances. In other cases, according to DOD officials, when a
secure conference is taking place, FAA officials cannot connect
themselves into the conference, the originating party must call them
and FAA must subsequently answer the call, in order to participate. If
unable to participate, FAA officials told us that they may be unable to
effectively manage other aircraft in the area in a timely manner,
potentially resulting in aircraft collisions or exposing aircraft
transiting the area to danger if the decision is made to shoot down the
violator.
Concept of Operations Plan for the National Capital Region Is
Completed, but Remaining Airspace Is Not Covered:
In April 2005, the agencies completed their interagency concept of
operations plan for the National Capital Region Coordination Center,
but the concept of operations plan does not address when and how
responsibility for response is passed from agency to agency during a
violation. Also, the agencies have not begun to develop a plan covering
any other U.S. airspace. Such plans outline the general concept of
program operations with specific actions and responsibilities to be
assigned to participating agencies in a separate, more detailed plan.
Without a concept of operations plan, the effective passing of
responsibility from one agency to another to respond to a restricted
airspace violation cannot be ensured, potentially leading to confusion
and a slower response.
Information Sharing Protocols and Procedures Have Not Been Established:
Information sharing protocols and procedures have not been established
by the agencies or within some parts of FAA. After the agencies
complete the response to an airspace violation, FAA and NORAD officials
record the violation in separate databases. These databases consist of
records of violations that, taken together, could reveal trends
indicating testing or training for an attack. However, neither FAA nor
NORAD routinely shares even parts of its data with the other.
Furthermore, the FAA database was not routinely shared with the
agency's own Strategic Operations Security Manager, despite the
manager's repeated attempts to obtain access. In May 2005, FAA finally
agreed to share parts of the database with its own Strategic Operations
Security Manager. Although the FAA database was set up for a different
purpose, the manager had previously indicated that he could use
information to enhance security; however, he told us that the FAA
department that maintains the database had previously refused to
provide the information, citing the need to protect pilot information.
We also obtained access to key elements of the database[Footnote 18]
and found information that could suggest approaches to reducing
violations of restricted airspace. For example, we could identify
aircraft that repeatedly violated restricted airspace and the airports
from which the flights originated. Specifically, we found 2 general
aviation aircraft that had accounted for 6 violations each, and 29
airports, 17 of which are in Maryland and Virginia, that had accounted
for about 30 percent of all airspace violations nationwide. This is the
type of information that was not shared with the FAA Strategic
Operations Security Manager, but which such an office might find useful
in light of intelligence agency threat assessments about the potential
for terrorist use of general aviation aircraft.
Additionally, FAA enforcement actions taken on airspace violations are
not routinely shared with other agencies. Since agencies do not have
this information, they have little knowledge as to the disposition and
effectiveness of their collective efforts, and they may be hampered in
their ability to target limited resources effectively. For example,
NORAD air defense-sector personnel did not have aggregated or general
information about FAA's administrative enforcement actions against
pilots who had violated restricted airspace in their sectors.[Footnote
19]
Common Definitions Have Not Been Accepted:
Finally, the potential for confusion exists about what constitutes a
restricted airspace violation because no common definition has been
accepted. FAA and NORAD, the primary agencies collecting airspace
violations data, define it differently. NORAD uses the term "incursion"
and defines different types of incursions depending on various factors,
including airspeed and direction. FAA uses the term "pilot deviation"
and defines it as the actions of a pilot that result in the violation
of a Federal Aviation Regulation or a NORAD Air Defense Identification
Zone, a category of restricted airspace. However, the terms are not
synonymous, and a violation can trigger a response in one agency but
not another, even though multiple agencies share the responsibility for
restricted airspace security and an appropriate, timely response is
critical. Moreover, without a common definition that can be used as a
basis for collecting nationwide data, the agencies may not be aware of
the scope and magnitude of violations, making it potentially more
difficult to target resources efficiently and enhance security.
Conclusions:
After the September 11, 2001, attacks, the fragmented missions of
agencies involved in securing and defending U.S. airspace converged
into a broader interagency mission to protect the airspace. Since
September 11, 2001, several involved agencies took actions that
represent noteworthy efforts to counter the threat to U.S. aviation and
the homeland. TSA has attempted to identify vulnerabilities of aircraft
and airports and consequently implemented and continues to implement
security enhancements. Although TSA is finishing the development of a
risk-assessment tool to assess general aviation threats, TSA has not
established milestones with specific actions needed to complete a
similar risk assessment for the commercial aviation sector. Until the
assessment is completed, TSA may lack complete knowledge as to the
level of risk in commercial aviation, and it cannot be assured that
commercial aircraft owners and operators at some airports are
effectively targeting resources to mitigate the risk of terrorists'
using commercial aircraft to attack population centers and critical
infrastructure. Because the interagency process to manage the response
to restricted airspace violations is a time-critical operation, the
implications of not having well-developed policies, procedures,
information sharing protocols, and common definitions are serious. In
addition, if information and databases are not appropriately shared,
opportunities to better target limited resources and proactively
identify emerging threats could be missed.
Recommendations for Executive Action:
We recommend that the Secretary of Homeland Security direct the
Assistant Secretary of TSA to establish milestones with specific
actions needed to complete risk assessments applicable to the
commercial aviation sector.
We further recommend that the Secretaries of Defense, Homeland
Security, and Transportation work together to:
* determine the extent to which one agency should be in charge of
leading the interagency process of responding to violations of
restricted airspace as they occur;
* determine the degree to which interagency policies, procedures, and
other guidance on the Domestic Events Network are needed to evaluate
its effectiveness and identify potential improvements;
* develop a concept of operations plan or other relevant document to
guide the interagency process of responding to violations in all U.S.
airspace;
* establish information sharing requirements and protocols; and:
* establish common definitions.
In addition, we recommend that the Secretaries of Defense and
Transportation work together to determine the extent to which key
elements of FAA's pilot deviations database could be shared with NORAD.
We also recommend that the Secretary of Transportation direct the
Administrator of FAA to take the following actions:
* Obtain necessary security clearances for appropriate FAA personnel to
ensure that they are not excluded from airspace violations conferences
that require such clearances; and:
* Ensure that FAA shares sufficient data from its airspace violation
database (also known as its pilot deviations database) with FAA's
office of the Strategic Operations Security Manager to meet the needs
of that office.
Agency Comments and Our Evaluation:
We received unclassified written comments from DHS, classified written
comments from DOD, and unclassified oral comments from the Department
of Transportation on the classified draft report that we will issue to
you in September 2005. We have included the DHS comments in their
entirety in appendix II and the unclassified portion of DOD's comments
in appendix III. Each agency also provided technical comments, and we
incorporated them in our draft report and this statement where
appropriate.
DHS and DOD disagreed with our draft report recommendation that the
secretaries of the three departments work together to appoint an
organization responsible for determining the extent to which one agency
should be in charge of countering violations of restricted airspace as
they occur. DHS maintains that each agency should maintain full
authority to execute its own portion of the mission that contributes to
the interagency effort. DHS and DOD both pointed out that the
Interagency Airspace Protection Working Group in the Homeland Security
Council addresses interagency coordination issues, and DHS indicated
that the working group may be a vehicle for addressing the gaps we
identified. We note that, to date, the issues we highlighted in our
testimony remain unresolved. Nevertheless, we revised our
recommendation to suggest that the secretaries of the three departments
work together to determine the extent to which one agency should be in
charge of leading the interagency process of responding to violations
of restricted airspace. Ultimately, we believe that if the agencies can
collectively resolve the issues and gaps we identified in our report,
which they acknowledged, then an organization in charge may not be
needed.
As discussed above, DHS agreed or partially agreed with the rest of our
recommendations, while DOD disagreed with most of the recommendations
and agreed with some. Department of Transportation officials agreed
with the recommendations in our draft report.
DHS generally concurred with our recommendation to establish milestones
with specific actions needed to complete risk assessments applicable to
the commercial aviation sector. In its response, DHS said that it
continues to conduct assessments as part of its risk-based management
approach. While these are good first steps, we still believe it is also
important to establish milestones with specific actions needed to
ensure that the assessments are completed within a reasonable time
period and are effectively managed. While DHS disagreed with having a
lead agency, its comments stated that more could be done to coordinate
efforts during violations, but that the focus should be on open
communications to ensure flexibility in responding to the violation.
DHS told us that the Interagency Airspace Protection Working Group
meets regularly and addresses relevant national airspace issues, but we
noted that there is still an absence of an air security strategy, plan,
or concept of operations, and the issues we found that could enhance
air security such as information sharing and common definitions still
need to be addressed. DHS concurred with our recommendations to
determine the degree to which interagency policies and procedures on
the Domestic Events Network are needed; develop a concept of operations
for management of the interagency response to violations in all U.S.
airspace; and establish information sharing requirements and protocols.
With regard to our recommendation to establish common definitions, DHS
concurred in part, citing that each agency's mission and command and
control processes require that it develop its own definitions for
airspace violations. However, DHS agreed to share its definitions with
other agencies. We agree that sharing definitions is important;
however, it is unclear to us whether simply sharing and not harmonizing
definitions would sufficiently reduce confusion during the interagency
operation responding to violations of restricted airspace. This is
especially a concern in a time-critical function where clear decisions
are imperative.
DOD concurred or partially concurred with some of our recommendations
and nonconcurred with others. DOD also noted that we omitted from our
draft report certain DOD procedures officials supplied to us that
integrate DOD's response to violations of restricted airspace with
those of other agencies. We acknowledge that DOD has internal
procedures that discuss the way DOD interacts with other agencies, and
we considered those procedures as part of our analysis. DOD's
procedures notwithstanding, we identified a number of potential gaps in
the interagency process of responding to violations of restricted
airspace that remain unaddressed.
We recommended that the Secretaries of Homeland Security, Defense, and
Transportation work together to accomplish five initiatives. First, DOD
nonconcurred with our recommendation that the three secretaries work
together to identify an organization that would be responsible for
addressing interagency coordination issues. As did DHS, DOD pointed out
that the Interagency Airspace Protection Working Group already
addresses interagency coordination for homeland air defense.
Nonetheless, problems remain. For example, as we point out in our
report, information sharing protocols and procedures have not been
established, a concept of operations plan for airspace outside the
national capital region has not been developed, and common definitions
have not been adopted. DOD also pointed out that TSA hosts agencies at
the National Capital Region Coordination Center. While true, TSA
officials told us that they view their role as one of deconflicting
rather than of leading interagency efforts. As stated earlier, we
believe that if the agencies can effectively resolve the issues and
gaps we identified in the interagency process of responding to
violations of restricted airspace without having an organization in
charge, then an organization in charge may not be needed.
Second, DOD nonconcurred with our recommendation that the three
secretaries work together to determine the extent to which one agency
should be in charge of leading the interagency process of responding to
violations of restricted airspace as they occur. DOD stated that our
report is misleading because it implies that having someone in charge
would prevent some airspace violations. DOD also stated that DHS has
managed air security by hardening commercial aircraft cockpit doors,
placing armed Federal Air Marshals on some flights, and taking other
actions. DOD also pointed out that FAA manages airspace for flight
safety and DOD defends domestic airspace. DOD stated that all of these
missions occur at all times and there is never a "lead change." As
discussed above, we revised and clarified our recommendation to suggest
that the secretaries of the three departments determine the extent to
which one agency should be in charge of leading the interagency process
of responding to restricted airspace violations. Our recommendation is
intended to enhance the response to violations of restricted airspace
and is not premised on the notion that its adoption would prevent the
violations from occurring. Moreover, while steps taken by DHS, FAA, and
DOD to secure aviation, ensure flight safety, and defend homeland
airspace are important contributions, they generally do not contribute
to knowing who is in charge of the response as a violation is
occurring. Also, we agree with DOD that there is never a "lead change,"
because the interagency process lacks central leadership. Finally, we
did not recommend that a specific agency or individual be in charge. We
recommended that the departments study the question of whether it would
be advantageous to have someone in the lead. If the departments
determined that such a change would be beneficial, they would
presumably also determine what, if any, changes in law would be needed.
We acknowledge, however, that if the agencies can effectively resolve
the issues and gaps we identified in the interagency process of
responding to restricted airspace violations, then an organization in
charge may not be needed.
Third, we recommended that the three secretaries determine whether
interagency policies, procedures, or other guidance is necessary to
evaluate Domestic Events Network performance and identify improvements.
DOD nonconcurred and stated that the Domestic Events Network is not
designed for decision making. We note that the network is a telephone
conferencing system that permits communication between the agencies
responding to violations of restricted airspace for the purpose of
deciding on the coordinated response. We are not aware that the
agencies have evaluated network performance to determine whether
enhancements are possible, and our recommendation was intended to
promote such an evaluation. We continue to believe that government
initiatives benefit from appropriate evaluation of performance, and
consequently we stand by our recommendation.
Fourth, we recommended that the secretaries work together to develop a
concept of operations plan for management of violations in all U.S.
airspace. DOD nonconcurred on the basis that the agencies do not manage
violations but respond to them. Nonetheless, DOD agreed that an overall
air strategy and identification of roles and missions for each agency
should be considered. We agree that an overall strategy for securing
U.S. air space would be beneficial, and we believe that if such a
strategy is developed, a concept of operations plan or other relevant
document would follow. As a result of DOD's comment, we have revised
our recommendation to one of developing a concept of operations plan or
other relevant document to guide the interagency response to violations
of restricted airspace.
Finally, DOD concurred with our recommendations that the secretaries
work together to establish information sharing protocols and procedures
and establish common definitions.
We had also recommended that the Secretaries of Defense and
Transportation work together to determine the extent to which key
elements of the FAA's pilot deviation database could be shared with
NORAD, and DOD nonconcurred. In its comments, DOD stated that it does
not require access to private citizen data contained in the FAA
database. We agree that DOD does not require such information. However,
we recommended that DOD meet with the Department of Transportation to
determine whether any elements would be useful, and if so, to pursue a
means to obtain them. Consequently, we stand by our recommendation.
Department of Transportation officials told us that they agreed with
our recommendations and indicated that a national air security policy
should be established to outline major goals and responsibilities for
each of the agencies with responsibilities for the protection of U.S.
airspace. Department officials also stated that without a national
policy, the agencies would continue to work without unified, common
goals. Transportation officials suggested that a policy coordinating
committee be established for air security to address interagency
issues. They also agreed that information sharing is critical to
enhance air security and told us that they had begun sharing pilot
deviations data with the FAA Strategic Operations Security Manager as
we had recommended. We agree with the Department's overall comments and
believe that this is the type of dialogue that should take place
between the Departments of Homeland Security, Defense, and
Transportation.
Mr. Chairman, this concludes my testimony. Thank you again for the
opportunity to discuss these issues. At this time, I would be happy to
address any questions.
[End of section]
Appendix I: Scope and Methodology:
In conducting our review of the response to violations of restricted
airspace, we visited key offices within DOD, DHS, and FAA that have
responsibility for oversight and management of U.S. airspace. We
conducted our review in the Washington, D.C., area, at DOD, including
the Office of the Assistant Secretary of Defense (Homeland Defense),
Defense Intelligence Agency, and Joint Theater Air and Missile Defense
Office; DHS, including the Office of Immigration and Customs
Enforcement, United States Secret Service, and the Transportation
Security Administration, including the National Capital Region
Coordination Center; FAA Headquarters, Domestic Events Network, Air
Traffic Control System Command Center, and the Potomac Consolidated
Terminal Radar Approach Control facility. We also met with the Federal
Bureau of Investigation, the Central Intelligence Agency, the National
Counterterrorism Center, the National Aeronautics and Space
Administration, and the Aircraft Owners and Pilots Association. We did
not review ground-based air defense batteries that are also part of the
homeland air defense system.
We conducted fieldwork at U.S. Northern Command and NORAD, Colorado
Springs, Colorado, as well as NORAD's Northeast Air Defense Sector,
Rome, New York; Western Air Defense Sector, Tacoma, Washington; and the
Continental U.S. NORAD Region and Southeast Air Defense Sector near
Panama City, Florida. In addition, we visited the Air Force's Air
Combat Command, Langley, Virginia, and 84th Radar Evaluation Squadron,
Ogden, Utah; Immigration and Customs Enforcement's Air and Marine
Operations Center, Riverside, California; and FAA's Air Traffic Control
Center, Fort Worth, Texas.
To determine the extent to which violations of restricted airspace have
occurred since September 11, 2001, we met with NORAD and FAA officials
to obtain relevant data from their incursion and pilot deviation
databases, respectively, and discussed their methods for determining
what constitutes an incursion/pilot deviation. After determining that
NORAD's database was not adequate to accurately identify the number of
violations of restricted airspace, we obtained relevant portions of
FAA's pilot deviation database and performed the analysis necessary to
develop the data provided in the report. We reviewed the reliability of
the FAA database to determine the numbers of incursions. We (1)
performed electronic testing of the data elements needed for our
analysis and looked for obvious errors in accuracy and completeness,
(2) reviewed related documentation, and (3) interviewed officials
knowledgeable about the data. We noted several limitations in the data,
including missing values for key data elements and the fact that events
might be both over-and under-reported due to varying definitions of
pilot deviations. We were able to partially correct for these problems
and consequently determined that the data were sufficiently reliable to
illustrate analyses for tracking violations of restricted airspace.
However, because we could not fully correct for data errors, the data
presented should be considered estimates rather than precise numbers.
To identify the actions taken individually or in coordinated fashion to
secure U.S. airspace and aviation and to mitigate the threat since
September 11, 2001, we interviewed officials at the National Capital
Region Coordination Center; the headquarters of NORAD and its
Continental U.S. NORAD Region and the three continental U.S. based air
defense sectors, TSA, FAA, and Air Combat Command; and the Air and
Marine Operations Center. We discussed and reviewed changes in
operational responsibilities and plans of these organizations both pre-
and post-September 11, 2001. To better understand these actions, we
toured and observed the workings of the National Capital Region
Coordination Center, the air defense sectors, the Domestic Events
Network, and the Air and Marine Operations Center. While at some of
these centers, we observed the agencies' responses to actual violations
of restricted airspace, the interaction of the agencies involved in
responding, and the steps taken by the various agencies involved to
address the violation. We discussed with agency officials the
procedures for responding to incursions into restricted airspace and
reviewed pertinent documentation relating to those procedures where
they existed.
In examining interagency policies and procedures that govern the
management of airspace violations, we first reviewed existing GAO work
that found that the success of interagency efforts depends on melding
multi-organizational efforts through central leadership, an overarching
strategy, effective partnerships, and common definitions. We then
compared the extent to which agencies with responsibility for
preventing or responding to violations of restricted airspace have
established an organization in charge, interagency policies and
procedures, protocols for the sharing of database records documenting
violations of restricted airspace, and common definitions of restricted
airspace.
We conducted our review from June 2004 through April 2005 in accordance
with generally accepted government auditing standards.
[End of section]
Appendix II: Comments from the Department of Homeland Security:
U.S. Department of Homeland Security:
Washington, DC 20528:
July 12, 2005:
Ms. Davi M. D'Agostino:
Director, Defense Capabilities and Management:
U.S. Government Accountability Office:
441 G Street, NW:
Washington, DC 20548:
Dear Ms. D'Agostino:
Thank you for the opportunity to comment on the Government
Accountability Office's (GAO) draft report titled, "HOMELAND SECURITY:
Interagency Resources Address Violations of Restricted Airspace but
Management Improvements are Needed" (GAO-05-472C). Technical comments
have been provided under separate cover.
The Department of Homeland Security (DHS) appreciates the work done in
this report to identify security issues associated with aircraft
incursions into restricted airspace. The Department believes that GAO's
identification of areas for improvement will add to the security of
aviation within the U.S. airspace. The Department's Transportation
Security Administration (TSA) generally concurs with GAO's findings,
but will address a few key issues in this letter.
DHS respectfully submits that GAO's emphasis on the need to have one
agency in charge of countering violations of restricted airspace may
actually hinder rather than facilitate an effective response. It should
be noted that the mission of air defense of the United States is
assigned to a single agency - the Department of Defense. However,
incursions of restricted airspace present a unique challenge since the
overwhelming majority of such incursions are caused by pilots operating
General Aviation aircraft, i.e., operations other than commercial
airlines or military. Although these incursions may represent
violations of airspace procedure, they rarely if ever pose a hostile
threat even as the possibility remains that they could.
Therefore, determining whether a specific restricted airspace incursion
represents a hostile threat is an essential task. Several agencies
contribute to this process by sorting (detecting, identifying, and
intercepting) unknown or non-compliant contacts that enter restricted
airspace. This sorting process declutters the air picture and supports
a determination of the potential hostile intent of airspace violators.
This effort succeeds best when each agency maintains full authority to
execute that portion of its own mission that contributes to this effort
and when all agencies fully coordinate and communicate with one
another. We fear that arbitrarily assigning lead agency responsibility
to one agency will hinder the flexibility of the coordinated effort.
It should also be noted that there is an interagency body that meets
regularly to coordinate airspace security issues, primarily in the
National Capital Region (NCR), but also elsewhere in the country as
needed. This body is the Interagency Airspace Protection Working Group
(IAPWG) whose membership includes several government agencies and such
DHS elements as TSA, U.S. Secret Service, Customs and Border Protection
Office of Air and Marine Operations (CBP/AMO), and the U.S. Coast Guard.
Most airspace violations are caused by pilots operating General
Aviation (GA) aircraft. TSA defines GA as operations other than
airlines or military aviation. GA is a diversified segment of the
aviation industry which accounts for approximately 77 percent of all
flights within the United States, and encompasses a wide array of
aircraft, ranging from large business jets and small recreational
aircraft to rotorcraft and airships. Additionally, GA consists of a
number of different types of operations, from corporate and certain
charter flight operations in small aircraft, to aerial observation and
crop dusting. Because this industry comprises such a large population
and diverse activities, TSA employs a threat based, risk management
approach to effectively utilize its resources and focus its efforts.
Simply "regulating" all of GA would be cost prohibitive and
inefficient. Therefore, it is incumbent when considering TSA oversight
for this industry that the segment of the industry being considered is
clearly delineated.
It is noted in GAO's report that TSA does not adequately regulate GA.
In fact, TSA regulates certain segments of the GA sector. As GAO
recently pointed out, the key to long-term success in securing general
aviation is a partnership among the federal government, state
governments, and the general aviation industry. [NOTE 1] To that end,
TSA and the Federal Aviation Administration (FAA) continue to provide
outreach to GA airport operators and pilots throughout the nation. For
example, TSA partnered with the Aviation Security Advisory Committee
(ASAC) to develop GA security recommendations which were included in
TSA's Information Publication A-001, "Security Guidelines for General
Aviation Airports." In addition, TSA developed the Airport Watch
Program in coordination with the Aircraft Owners and Pilots Association
(AOPA) which seeks to improve local awareness through public
communication and promotes the reporting of suspicious activity to TSA.
TSA regulates certain charter flight operations in small aircraft,
instruction of alien flight students and the provision of security
awareness training to employees of flight schools. During periods of
heightened alerts, TSA may also promulgate additional restrictions
based on threat. For instance, in August 2004, when TSA was presented
with credible threat information in New York City, TSA mandated
requirements for the helicopter tour industry to address the specific
threat.
Comments on GAO Recommendations Relevant to DHS:
Recommendation 1: Secretary of Homeland Security to direct TSA to
establish milestones with specific actions to complete risk assessments
applicable to the commercial aviation sector.
DHS generally concurs with this recommendation. Currently TSA performs
vulnerability assessments at commercial airports; the assessments
include air carrier operations and the environment they operate within.
These assessments are provided to the Federal Security Director and the
airport operator and used to improve the overall security posture of
the airport. TSA plans to continue this work as part of its risk-based
management approach. The vulnerability assessments are reviewed in
conjunction with threat assessments and developed into risk
assessments. TSA uses these risk assessments as tools to enhance
aviation security, including prevention and management of air
incursions.
GAO Recommendation 2: The Secretaries of Defense, Homeland Security and
Transportation work together to appoint an organization responsible for
addressing interagency coordination efforts to include:
a. Determining the extent to which one agency should be in charge of
countering violations of restricted airspace as they occur.
DHS concurs in part. DHS is committed to handling airspace violations
in the most effective manner possible and agrees more can be done to
coordinate efforts during airspace restriction violations. DHS believes
that the focus should not be on a single agency leading the response;
it is more important that each agency maintain its command and control
but allow open communication with the other agencies to ensure
flexibility in response and resolution of the violation.
In addition to the coordinated agency response and resolution, there is
currently an InterAgency Airspace Protection Working Group (IAPWG) that
meets regularly to address issues that affect aviation security. The
IAPWG was created after the attacks of September 11, 2001 and works to
coordinate and address airspace issues that pertain to the National
Capital Region, and addresses other relevant national airspace issues.
The IAPWG, which was chartered by the Homeland Security Council, serves
as a forum to bring multiple government organizations together as full
partners in the cooperative development of procedures and policies to
enhance Homeland Air Security. Currently, at the request of the HSC and
as per the majority vote of the membership, TSA is chairing the IAPWG.
b. Determining the degree to which interagency policies, procedures,
and other necessary guidance on the Domestic Events Network are needed
to evaluate its effectiveness and identify potential improvements.
DHS concurs. DHS commends the FAA in its operation of the Domestic
Events Network (DEN), as it provides an open line of communication for
real time coordination during events. DHS will work with other agencies
to determine whether interagency policies, procedures, and other
guidance are needed.
c. Developing a concept of operations for management of violations in
all U.S. airspace.
DHS concurs. It is important to note that it is ultimately each pilot's
responsibility to request the most recent information regarding
temporary flight restrictions and to review the latest Notices to
Airmen (NOTAM) issued by the FAA before initiating flight operations.
However, TSA and the FAA will continue to provide outreach to GA
airport operators and pilots to prevent pilot based airspace
violations. The outreach campaign includes "Pilot Town Meetings,"
development and dissemination of informational materials throughout the
nation, and leveraging government and industry websites.
TSA, in coordination with FAA, and as a member of the IAPWG, will
continue to develop a concept of operations to manage airspace
violations throughout the nation that relies primarily on risk
management principles. Such a risk management approach allows TSA to
determine which areas present the greatest vulnerabilities that need to
be addressed immediately. Consequently, TSA will continue to enact
reasonable, feasible, and effective security measures appropriate to
the airspace environment while endeavoring to minimize impacts on the
national airspace.
d. Establishing information sharing requirements and protocols.
DHS concurs. TSA works with several agencies through the DEN which was
established in response to September 11, 2001 and is maintained by the
FAA. The DEN's 24-hour access provides a real time method for hundreds
of government entities to share information about the violation, and
about how each entity is moving to resolve the violation according to
the mission. The DEN, in addition to direct phone calls, text
messaging, and face-to-face meetings, provides an atmosphere of
information exchange among agencies in an efficient manner. In
coordination with other agencies, TSA will continue efforts to enhance
information sharing.
e. Establishing common definitions.
DHS concurs in part. Each agency's mission and command and control
processes require that the agency develop its own definition for
airspace violations. However, in order to promote commonality, TSA will
work with other agencies to share definitions.
In conclusion, thank you again for providing this report to assist
Congress in better understanding the communication and processes that
are associated with airspace violations throughout the United States.
We look forward to working with you on future homeland security issues.
Sincerely,
Signed by:
Steven J. Pecinovsky:
Director:
Departmental GAO/OIG Audit Liaison:
NOTE:
[1] General Aviation Security: Increased Federal Oversight Needed, but
Continued Partnership with the Private Sector is Critical to Long-Term
Success, GAO-05-144, (Washington, DC, December 10, 2004).
[End of section]
Appendix III: Comments from the Department of Defense:
UNCLASSIFIED:
ASSISTANT SECRETARY OF DEFENSE:
HOMELAND DEFENSE:
2600 DEFENSE PENTAGON:
WASHINGTON, DC 20301-2600:
13 JUL 2005:
Ms. Davi M. D'Agostino:
Director, Defense Capabilities and Management:
U.S. Government Accountability Office:
441 G Street, N.W.:
Washington, DC 20548:
Dear Ms. D'Agostino:
(U) This is the Department of Defense response to the GAO draft report,
"HOMELAND SECURITY: Interagency Resources Targeted to Address
Violations of Restricted Airspace but Management Improvements are
Needed," dated June 1, 2005 (GAO Code 350538/GAO-05-472C).
(U) In general, some of the recommendations omitted DoD's specific
substantiation of procedures that integrate DoD with other Federal
agencies during identification of tracks of interest. This information
was provided to GAO auditors during the engagement process. Our
comments will focus on these issues. Enclosure I deals specifically
with the report recommendations for DoD; enclosure 2 provides technical
comments on the accuracy and completeness of the report.
(U) Thank you for the opportunity to review the report. Mr. Johnnie
Wauchop, Assistant for the Air Domain, Force Planning and Employment,
has the lead for this effort in my organization. He may be reached at
(703) 693-1968.
Signed by:
Paul McHale:
Enclosures:
1. DoD Comments on the Recommendations.
2. DoD Technical Comments:
This memorandum standing alone is UNCLASSIFIED:
[End of section]
Appendix IV: GAO Contact and Staff Acknowledgments:
GAO Contact:
Davi M. D'Agostino (202) 512-5431:
Acknowledgments:
Brian J. Lepore, Lorelei St. James, James F. Reid, James R. Nelson,
Carissa D. Bryant, Ronald La Due Lake, Rebecca Shea, Michael C. Zola,
Cheryl Weissman, and R.K. Wild made key contributions to this
statement.
[End of section]
Related GAO Products:
General Aviation Security: Increased Federal Oversight Is Needed, But
Continued Partnership with Private Sector is Critical to Long-Term
Success. GAO-05-144. Washington, D.C.: September 30, 2004.
Homeland Defense: Progress Made in Organizing to Achieve Northern
Command's Mission, but Challenges Remain. GAO-04-622C. Washington,
D.C.: September 8, 2004.
Homeland Security: Efforts to Improve Information Sharing Need to be
Strengthened. GAO-03-760. Washington, D.C.: August 27, 2003.
Homeland Defense: DOD Needs to Assess the Structure of U.S. forces for
Domestic Military Missions. GAO-03-670. Washington, D.C.: July 11,
2003.
Homeland Security: Effective Intergovernmental Coordination is Key to
Success. GAO-02-1013T. Washington, D.C.: August 23, 2002.
Homeland Security: Key Elements to Unify Efforts Are Underway but
Uncertainty Remains. GAO-02-610. Washington, D.C.: June 7, 2002.
Combating Terrorism: Selected Challenges and Related Recommendations.
GAO-01-822. Washington, D.C.: September 20, 2001.
FOOTNOTES
[1] Critical infrastructure is defined as systems or assets, whether
physical or virtual, so vital to the nation that the incapacity or
destruction of them would have a debilitating impact on national
economic security, national public health, or safety.
[2] GAO, Homeland Security: Key Elements to Unify Efforts Are Underway
but Uncertainty Remains, GAO-02-610 (Washington, D.C.: June 7, 2002).
[3] "Each person shall, before conducting any operation under the
Federal Aviation Regulations (14 C.F.R. Chapter 1), be familiar with
all available information concerning that operation, including Notices
to Airmen issued under §91.139," 14 C.F.R. pt. 91, SFAR No. 60 - Air
Traffic Control Emergency Operation.
[4] Pilots are required to check Notices to Airmen before beginning
their flights to avoid any temporary flight restricted zones during
their flights. These notices contain the specific locations and times
that airspace is restricted.
[5] While our report discusses management of restricted airspace
violations, the mission of the Domestic Events Network also includes
managing the response to hijackings, suspicious activities, and other
events.
[6] Risk assessments involve assessing a facility's threats,
vulnerabilities, and critical assets to determine where resources
should be targeted to reduce risk.
[7] On this review, we did not evaluate the adequacy of TSA's risk
assessment tools; however, in other reviews GAO is assessing various
aspects of TSA's risk management approaches.
[8] Airspace outside the National Capital Region is protected for
National Security Special Events and Presidential movements, and when
intelligence warrants protection.
[9] 14 C.F.R. pt. 99 (2005).
[10] 14 C.F.R. pt. 71 (2005).
[11] We did not evaluate the effectiveness of these efforts.
[12] The resources discussed are not meant to be all-inclusive, but are
used to highlight some of the resources that have been provided.
Providing an all-inclusive list was beyond the scope of our review.
[13] Pub. L. No. 107-71 (2001).
[14] In November 2003, the Federal Air Marshal Service was transferred
to Immigration and Customs Enforcement.
[15] Operation Noble Eagle is a DOD-led military mission that began on
September 11, 2001, to defend the United States against terrorism or
foreign aggression.
[16] NORAD may monitor for other activities if, for example, it
receives intelligence information that indicates an aircraft may
present a potential threat. Because NORAD data includes information on
other airspace activity as well as violations into restricted airspace,
NORAD data did not correspond to FAA data for the same time period.
[17] GAO, General Aviation Security: Increased Federal Oversight Is
Needed, but Continued Partnership with the Private Sector Is Critical
to Long-Term Success, GAO-05-144 (Washington, D.C.: November 10, 2004).
[18] FAA excluded pilot information from the key elements we obtained.
[19] Such information would not have to include privacy information
that could be used to identify individual pilots.